SlideShare a Scribd company logo
1 of 4
Download to read offline
1
JCCCRA TechTalk: The Ten Commandments of Online Security and Privacy (Thurs., Nov. 29, 2018)
Description: Unless you’re tech-savvy or a member of Generation Z, knowing what can endanger your
personal security and privacy online can be confusing. In this round table discussion, we’ll discuss the 10
commandments of online security and open the discussion up for attendees to share personal
experiences and lessons learned regarding online security and issues related to online privacy.
Examples of scams and Phishing:
“This is the IRS calling and if you don’t pay your back taxes immediately, you will be arrested and taken
to jail.”
“We’ve detected that your home computer has a malware virus. We can help you protect your data if
you give us access to your computer.”
The Ten Commandments of Online Security and Privacy
1. Thou shalt lock your devices (smartphones, tables, laptops, desktop computers) when not in
use.
2. Thou shalt protect your computing devices with an antivirus program.
a. And keep those programs up-to-date
3. Thou shalt choose strong, complex passwords or phrases.
a. Passwords should be 10-12 characters or more
b. Include numbers, upper and lowercase letters and special characters, if allowed
c. Never use the default password on a device (e.g., router) or account
d. Use different passwords for key personal and professional sites
2
i. Financial
ii. Health
iii. Social Security/Medicare
iv. Credit Card
e. You can generate passwords at http://passwordsgenerator.net/
f. Use a password vault (mSecure, Norton Password Manager, Browser password vault?)
g. Change your passwords regularly
4. Thou shalt regularly review privacy settings.
a. For Facebook: https://www.facebook.com/help/325807937506242 and
https://www.facebook.com/help/securitytips
b. For Google: https://myaccount.google.com/privacy
c. For Apple Store: https://www.apple.com/privacy/manage-your-privacy/
d. For your browser: Chrome https://support.google.com/chrome/answer/114836, Edge
https://privacy.microsoft.com/en-us/windows-10-microsoft-edge-and-privacy, Firefox
https://support.mozilla.org/en-US/products/firefox/privacy-and-security and Internet
Explorer https://support.microsoft.com/en-us/help/17441/windows-internet-explorer-
change-reset-settings#1TC=windows-7
e. Twitter: https://help.twitter.com/en/safety-and-security/account-security-tips
5. Thou shalt always ensure your internet connection is safe and secure.
a. Use a virtual private network (VPN) when on public WifI
i. https://www.f-secure.com/en_US/web/home_us/freedome $$4.17-$6.67
monthly or $49.99-$79.99 yearly charge (depending on number of devices: 3-7)
ii. https://us.norton.com/wifi-privacy $7.99 monthly, $39.99 yearly (jumps to
$79.99 after first year)
iii. 10+ Free VPN Software Programs https://www.lifewire.com/vpn-client-and-
server-software-downloads-818192
b. Install and use a firewall on all computing devices
i. A firewall is a barrier or shield that is intended to protect your PC, tablet, or
phone from the data-based malware dangers that exist on the Internet.
ii. Windows, Norton and most anti-virus programs include a firewall
iii. Be sure your firewall is enabled (Windows XP by default is not)
c. If a company (e.g., credit card) offers login or activity notifications, enroll!
6. Thou shalt practice safe browsing.
a. Be careful how much personal information you post online
b. Avoid click bait and dubious websites
c. Be wary of links in unsolicited email and posts (very risky)
d. Be wary of unanticipated file attachments from friends, financial institutions, credit card
companies and so on
i. Do not click links in email messages from companies or financial institutions
ii. Instead go to their known web address
e. Using a banking app is typically safer than using their website
7. Thou shalt make online purchases only from secure sites.
3
a. Look for https:// prefix to web addresses
b. Look for the locked padlock icon preceding the web address in your browser
c. An unlocked padlock means communications are not secure and protected by a secure
sockets layer (SSL).
d. SSL means communications between your web browser and the web server is encrypted
8. Thou shalt use great discretion when downloading files, apps and documents.
a. Download apps from Google Play or the Apple App Store only
b. Exceptions: apps from secure and known sites
9. Thou shalt use two-factor authentication when available.
a. Microsoft: https://support.microsoft.com/en-us/help/12408/microsoft-account-how-to-
use-two-step-verification
b. Google: https://support.google.com/a/answer/175197
c. Facebook: https://www.facebook.com/help/148233965247823
d. Apple: https://support.apple.com/en-us/HT204915
e. Most financial institutions offer it
f. Many online accounts offer it
10. Thou shalt actively keep abreast of online scams and keep your guard up.
Definitions
Phishing: A scam by which an Internet user is duped (as by a deceptive e-mail message) into
revealing personal or confidential information which the scammer can use illicitly. A common
phishing scam involves sending e-mails that appear to come from banks requesting recipients to
verify their accounts by typing personal details, such as credit card information, into a Web site that
has been disguised to look like the real thing.
Malware = Malicious Software: Software designed to interfere with a computer's normal
functioning.
Ransomware: Malware that requires the victim to pay a ransom to access encrypted files.
In September of 2013, security for small accounting offices changed forever with the appearance of
a new class of threats called ransomware. … you open a file attached to an innocent-looking e-mail,
and the program encrypts key files and drives so they cannot be accessed. The files are locked until
you pay a ransom. — Dave Mcclure
With ransomware, a hacker (electronically) slips into a system, then puts encryption controls in
place that locks users out. The hackers then demand money to "unlock" the data. — Elizabeth
Millard
Notes
Many phishing schemes start with something looking very innocent and official but lead unassuming
users to websites designed to collect the personal information from you. If you receive an email from
4
any websites asking for personal information, open a new tab and go direct to known web address for
the company instead of clicking links within the email.
Legitimate online services should never ask you for your login credentials (username and password),
social security number, Medicare number, or other personal data (address, maiden name, mother’s
maiden name, and so on).
Sources
https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-internet-safety-rules-and-what-
not-to-do-online
https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/10-tips-stay-safe-online/
https://securingtomorrow.mcafee.com/
https://www.webroot.com/blog/2014/08/06/8-tips-stay-safe-online/
https://blog.f-secure.com/10-things-we-can-all-do-to-make-a-safer-internet/
https://www.fbi.gov/scams-and-safety common fraud schemes, on the Internet e-scams, about
protecting your kids
https://blog.f-secure.com/online-banking-tips-3-security-essentials-you-need-to-know/
https://blog.f-secure.com/at-least-5-things-you-shouldnt-share-on-the-internet/
Definitions from https://www.merriam-webster.com
https://staysafeonline.org/stay-safe-online/managing-your-privacy/privacy-tips-teens/
https://staysafeonline.org/stay-safe-online/managing-your-privacy/privacy-tips-older-adults/

More Related Content

What's hot

Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafetyteachesict
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rulesritz482
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricksSudhanshu Mishra
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 

What's hot (20)

Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricks
 
C 7
C 7C 7
C 7
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 

Similar to JCCCRA TechTalk: 10 Online Security Commandments

Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®Danny Fredericks
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Kimberley Dray
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 

Similar to JCCCRA TechTalk: 10 Online Security Commandments (20)

Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
techalpha07
techalpha07techalpha07
techalpha07
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Users guide
Users guideUsers guide
Users guide
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 

More from Jonathan Bacon

Chapter 5 Jeremiah: Plucking Up and Planting
Chapter 5 Jeremiah: Plucking Up and PlantingChapter 5 Jeremiah: Plucking Up and Planting
Chapter 5 Jeremiah: Plucking Up and PlantingJonathan Bacon
 
The Naked Truth About Retirement 2021 Edition
The Naked Truth About Retirement 2021 EditionThe Naked Truth About Retirement 2021 Edition
The Naked Truth About Retirement 2021 EditionJonathan Bacon
 
Johnson County Community College Fall 2020 General Meeting
Johnson County Community College Fall 2020 General MeetingJohnson County Community College Fall 2020 General Meeting
Johnson County Community College Fall 2020 General MeetingJonathan Bacon
 
Walking, Hiking, Cycling Trails of Johnson County
Walking, Hiking, Cycling Trails of Johnson CountyWalking, Hiking, Cycling Trails of Johnson County
Walking, Hiking, Cycling Trails of Johnson CountyJonathan Bacon
 
Online Discussion: Ways to Address Online Privacy and Security
Online Discussion: Ways to Address Online Privacy and SecurityOnline Discussion: Ways to Address Online Privacy and Security
Online Discussion: Ways to Address Online Privacy and SecurityJonathan Bacon
 
The Naked Truth About Retirement - 2020 Edition
The Naked Truth About  Retirement - 2020 EditionThe Naked Truth About  Retirement - 2020 Edition
The Naked Truth About Retirement - 2020 EditionJonathan Bacon
 
Mobile Photo Editing with Snapseed
Mobile Photo Editing with SnapseedMobile Photo Editing with Snapseed
Mobile Photo Editing with SnapseedJonathan Bacon
 
Fake News and Mainstream Media Bias
Fake News and Mainstream Media BiasFake News and Mainstream Media Bias
Fake News and Mainstream Media BiasJonathan Bacon
 
400+ Channels & Nothing to Watch
400+ Channels & Nothing to Watch400+ Channels & Nothing to Watch
400+ Channels & Nothing to WatchJonathan Bacon
 
iPhone Tips for Everyday Users
iPhone Tips for Everyday Users iPhone Tips for Everyday Users
iPhone Tips for Everyday Users Jonathan Bacon
 
Notes Included: Naked Truth About Retirement 2019
Notes Included: Naked Truth About Retirement 2019Notes Included: Naked Truth About Retirement 2019
Notes Included: Naked Truth About Retirement 2019Jonathan Bacon
 
Naked Truth About Retirement 2019
Naked Truth About Retirement 2019Naked Truth About Retirement 2019
Naked Truth About Retirement 2019Jonathan Bacon
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Exploring Travel Apps and Tools
Exploring Travel Apps and Tools Exploring Travel Apps and Tools
Exploring Travel Apps and Tools Jonathan Bacon
 
Athanasius of Alexandria
Athanasius of AlexandriaAthanasius of Alexandria
Athanasius of AlexandriaJonathan Bacon
 
Exploring Do-It-Yourself and Installed Home Security Systems
Exploring Do-It-Yourself and Installed Home Security SystemsExploring Do-It-Yourself and Installed Home Security Systems
Exploring Do-It-Yourself and Installed Home Security SystemsJonathan Bacon
 
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes Jonathan Bacon
 
Quick Guide to Google Photos
Quick Guide to Google PhotosQuick Guide to Google Photos
Quick Guide to Google PhotosJonathan Bacon
 
Cutting the Cable and Reducing Your Media Costs
Cutting the Cable and Reducing Your Media CostsCutting the Cable and Reducing Your Media Costs
Cutting the Cable and Reducing Your Media CostsJonathan Bacon
 

More from Jonathan Bacon (20)

Chapter 5 Jeremiah: Plucking Up and Planting
Chapter 5 Jeremiah: Plucking Up and PlantingChapter 5 Jeremiah: Plucking Up and Planting
Chapter 5 Jeremiah: Plucking Up and Planting
 
The Naked Truth About Retirement 2021 Edition
The Naked Truth About Retirement 2021 EditionThe Naked Truth About Retirement 2021 Edition
The Naked Truth About Retirement 2021 Edition
 
Johnson County Community College Fall 2020 General Meeting
Johnson County Community College Fall 2020 General MeetingJohnson County Community College Fall 2020 General Meeting
Johnson County Community College Fall 2020 General Meeting
 
Walking, Hiking, Cycling Trails of Johnson County
Walking, Hiking, Cycling Trails of Johnson CountyWalking, Hiking, Cycling Trails of Johnson County
Walking, Hiking, Cycling Trails of Johnson County
 
Online Discussion: Ways to Address Online Privacy and Security
Online Discussion: Ways to Address Online Privacy and SecurityOnline Discussion: Ways to Address Online Privacy and Security
Online Discussion: Ways to Address Online Privacy and Security
 
The Naked Truth About Retirement - 2020 Edition
The Naked Truth About  Retirement - 2020 EditionThe Naked Truth About  Retirement - 2020 Edition
The Naked Truth About Retirement - 2020 Edition
 
Mobile Photo Editing with Snapseed
Mobile Photo Editing with SnapseedMobile Photo Editing with Snapseed
Mobile Photo Editing with Snapseed
 
Fake News and Mainstream Media Bias
Fake News and Mainstream Media BiasFake News and Mainstream Media Bias
Fake News and Mainstream Media Bias
 
400+ Channels & Nothing to Watch
400+ Channels & Nothing to Watch400+ Channels & Nothing to Watch
400+ Channels & Nothing to Watch
 
Social Media Risks
Social Media RisksSocial Media Risks
Social Media Risks
 
iPhone Tips for Everyday Users
iPhone Tips for Everyday Users iPhone Tips for Everyday Users
iPhone Tips for Everyday Users
 
Notes Included: Naked Truth About Retirement 2019
Notes Included: Naked Truth About Retirement 2019Notes Included: Naked Truth About Retirement 2019
Notes Included: Naked Truth About Retirement 2019
 
Naked Truth About Retirement 2019
Naked Truth About Retirement 2019Naked Truth About Retirement 2019
Naked Truth About Retirement 2019
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Exploring Travel Apps and Tools
Exploring Travel Apps and Tools Exploring Travel Apps and Tools
Exploring Travel Apps and Tools
 
Athanasius of Alexandria
Athanasius of AlexandriaAthanasius of Alexandria
Athanasius of Alexandria
 
Exploring Do-It-Yourself and Installed Home Security Systems
Exploring Do-It-Yourself and Installed Home Security SystemsExploring Do-It-Yourself and Installed Home Security Systems
Exploring Do-It-Yourself and Installed Home Security Systems
 
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
 
Quick Guide to Google Photos
Quick Guide to Google PhotosQuick Guide to Google Photos
Quick Guide to Google Photos
 
Cutting the Cable and Reducing Your Media Costs
Cutting the Cable and Reducing Your Media CostsCutting the Cable and Reducing Your Media Costs
Cutting the Cable and Reducing Your Media Costs
 

Recently uploaded

VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

JCCCRA TechTalk: 10 Online Security Commandments

  • 1. 1 JCCCRA TechTalk: The Ten Commandments of Online Security and Privacy (Thurs., Nov. 29, 2018) Description: Unless you’re tech-savvy or a member of Generation Z, knowing what can endanger your personal security and privacy online can be confusing. In this round table discussion, we’ll discuss the 10 commandments of online security and open the discussion up for attendees to share personal experiences and lessons learned regarding online security and issues related to online privacy. Examples of scams and Phishing: “This is the IRS calling and if you don’t pay your back taxes immediately, you will be arrested and taken to jail.” “We’ve detected that your home computer has a malware virus. We can help you protect your data if you give us access to your computer.” The Ten Commandments of Online Security and Privacy 1. Thou shalt lock your devices (smartphones, tables, laptops, desktop computers) when not in use. 2. Thou shalt protect your computing devices with an antivirus program. a. And keep those programs up-to-date 3. Thou shalt choose strong, complex passwords or phrases. a. Passwords should be 10-12 characters or more b. Include numbers, upper and lowercase letters and special characters, if allowed c. Never use the default password on a device (e.g., router) or account d. Use different passwords for key personal and professional sites
  • 2. 2 i. Financial ii. Health iii. Social Security/Medicare iv. Credit Card e. You can generate passwords at http://passwordsgenerator.net/ f. Use a password vault (mSecure, Norton Password Manager, Browser password vault?) g. Change your passwords regularly 4. Thou shalt regularly review privacy settings. a. For Facebook: https://www.facebook.com/help/325807937506242 and https://www.facebook.com/help/securitytips b. For Google: https://myaccount.google.com/privacy c. For Apple Store: https://www.apple.com/privacy/manage-your-privacy/ d. For your browser: Chrome https://support.google.com/chrome/answer/114836, Edge https://privacy.microsoft.com/en-us/windows-10-microsoft-edge-and-privacy, Firefox https://support.mozilla.org/en-US/products/firefox/privacy-and-security and Internet Explorer https://support.microsoft.com/en-us/help/17441/windows-internet-explorer- change-reset-settings#1TC=windows-7 e. Twitter: https://help.twitter.com/en/safety-and-security/account-security-tips 5. Thou shalt always ensure your internet connection is safe and secure. a. Use a virtual private network (VPN) when on public WifI i. https://www.f-secure.com/en_US/web/home_us/freedome $$4.17-$6.67 monthly or $49.99-$79.99 yearly charge (depending on number of devices: 3-7) ii. https://us.norton.com/wifi-privacy $7.99 monthly, $39.99 yearly (jumps to $79.99 after first year) iii. 10+ Free VPN Software Programs https://www.lifewire.com/vpn-client-and- server-software-downloads-818192 b. Install and use a firewall on all computing devices i. A firewall is a barrier or shield that is intended to protect your PC, tablet, or phone from the data-based malware dangers that exist on the Internet. ii. Windows, Norton and most anti-virus programs include a firewall iii. Be sure your firewall is enabled (Windows XP by default is not) c. If a company (e.g., credit card) offers login or activity notifications, enroll! 6. Thou shalt practice safe browsing. a. Be careful how much personal information you post online b. Avoid click bait and dubious websites c. Be wary of links in unsolicited email and posts (very risky) d. Be wary of unanticipated file attachments from friends, financial institutions, credit card companies and so on i. Do not click links in email messages from companies or financial institutions ii. Instead go to their known web address e. Using a banking app is typically safer than using their website 7. Thou shalt make online purchases only from secure sites.
  • 3. 3 a. Look for https:// prefix to web addresses b. Look for the locked padlock icon preceding the web address in your browser c. An unlocked padlock means communications are not secure and protected by a secure sockets layer (SSL). d. SSL means communications between your web browser and the web server is encrypted 8. Thou shalt use great discretion when downloading files, apps and documents. a. Download apps from Google Play or the Apple App Store only b. Exceptions: apps from secure and known sites 9. Thou shalt use two-factor authentication when available. a. Microsoft: https://support.microsoft.com/en-us/help/12408/microsoft-account-how-to- use-two-step-verification b. Google: https://support.google.com/a/answer/175197 c. Facebook: https://www.facebook.com/help/148233965247823 d. Apple: https://support.apple.com/en-us/HT204915 e. Most financial institutions offer it f. Many online accounts offer it 10. Thou shalt actively keep abreast of online scams and keep your guard up. Definitions Phishing: A scam by which an Internet user is duped (as by a deceptive e-mail message) into revealing personal or confidential information which the scammer can use illicitly. A common phishing scam involves sending e-mails that appear to come from banks requesting recipients to verify their accounts by typing personal details, such as credit card information, into a Web site that has been disguised to look like the real thing. Malware = Malicious Software: Software designed to interfere with a computer's normal functioning. Ransomware: Malware that requires the victim to pay a ransom to access encrypted files. In September of 2013, security for small accounting offices changed forever with the appearance of a new class of threats called ransomware. … you open a file attached to an innocent-looking e-mail, and the program encrypts key files and drives so they cannot be accessed. The files are locked until you pay a ransom. — Dave Mcclure With ransomware, a hacker (electronically) slips into a system, then puts encryption controls in place that locks users out. The hackers then demand money to "unlock" the data. — Elizabeth Millard Notes Many phishing schemes start with something looking very innocent and official but lead unassuming users to websites designed to collect the personal information from you. If you receive an email from
  • 4. 4 any websites asking for personal information, open a new tab and go direct to known web address for the company instead of clicking links within the email. Legitimate online services should never ask you for your login credentials (username and password), social security number, Medicare number, or other personal data (address, maiden name, mother’s maiden name, and so on). Sources https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-internet-safety-rules-and-what- not-to-do-online https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/10-tips-stay-safe-online/ https://securingtomorrow.mcafee.com/ https://www.webroot.com/blog/2014/08/06/8-tips-stay-safe-online/ https://blog.f-secure.com/10-things-we-can-all-do-to-make-a-safer-internet/ https://www.fbi.gov/scams-and-safety common fraud schemes, on the Internet e-scams, about protecting your kids https://blog.f-secure.com/online-banking-tips-3-security-essentials-you-need-to-know/ https://blog.f-secure.com/at-least-5-things-you-shouldnt-share-on-the-internet/ Definitions from https://www.merriam-webster.com https://staysafeonline.org/stay-safe-online/managing-your-privacy/privacy-tips-teens/ https://staysafeonline.org/stay-safe-online/managing-your-privacy/privacy-tips-older-adults/